<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=806625360795729&amp;ev=PageView&amp;noscript=1">

Nextech AR Solutions Acceptable Use Policy


Acceptable Use Policy

This Acceptable Use Policy sets forth guidelines relating to the types of content that Customer may upload to the web servers under its agreement with Company for services (the "Services"). Company may remove any materials that, in its sole discretion, may be illegal, may subject it to liability, or which may violate this Acceptable Use Policy. Company will cooperate with legal authorities in the investigation of any suspected or alleged crime or civil wrong arising from any use of the Services. Customer’s violation of this Acceptable Use Policy may result in the suspension or termination of either Customer’s access to the Services and/or Customer’s account or other actions as detailed in the Master Service Agreement.

1. Acceptable Use: The following constitute violations of this Acceptable Use Policy:

1.1.  Illegal Use: Using the Services to transmit or post any material that, intentionally or unintentionally, violates any applicable local, state, national or international law, or any rules or regulations promulgated thereunder.

1.2.  Harm to Minors: Using the Services to harm, or attempt to harm, minors in any way.

1.3.  Harassment: Using the Services to transmit or post any material that harasses, threatens, or encourages bodily harm or destruction of property.

1.4.  Fraudulent Activity: Using the Services to make fraudulent misrepresentations or offers including but not limited to offers relating to "pyramid schemes" and "Ponzi schemes."

1.5.  Unsolicited commercial email/Unsolicited bulk email (SPAM): Using the Services to transmit any unsolicited commercial or unsolicited bulk e-mail is expressly prohibited. Violations of this type will result in the immediate termination of the offending account.

1.6.  Unauthorized Access: Using the Services to access, or to attempt to access, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company or another entity's computer software or hardware, electronic communications system or telecommunications system, whether or not the intrusion results in the corruption or loss of data.

1.7.  Fraudulent Links: Use of fraudulent referrers to Company’s services is forbidden. This includes, but is not limited to, blog ping backs. Inappropriate (e.g. off-topic or automated) postings to forums, or other services containing links to any of Company’s services is forbidden.

1.8.  Infringement: Using the Services to transmit or post any material that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying and/or distribution of copyrighted material, the digitization and distribution of photographs from magazines, books, music, video or other copyrighted sources, and the unauthorized transmittal of copyrighted software.

1.9.  Phishing: Using the Services to collect, or attempt to collect, personal information about third parties without their knowledge or consent.

1.10.  Resale: Reselling the Services without the prior written authorization of Company.

1.11.  Interference: Using the Services for any activity that adversely affects the ability of other people or systems to use the Services or the Internet. This includes but is not limited to "denial of service" (DoS) attacks against another network, company, or individual customer. Interference with or disruption of other network customers, network services or network equipment is prohibited.

1.12.  Servers or Proxies: Use of software or scripts which creates a listening socket on Company’s network. Proxies which receive requests over HTTP and use Company’s network connection to forward the request to another server are not permitted. This includes, but is not limited to, HTTP proxies. 

1.13.  File Sharing and BitTorrent: Use of software for "file sharing", "bit torrents" or similar is not allowed on Company’s network. This includes sending or receiving files using these mechanisms.

2. Reporting of Violations of This Acceptable Use Policy: Company requests that anyone who believes that there has been a violation of this Acceptable Use Policy to immediately send an email detailing such violation to support@jolokia.com.

3. Revisions to This Acceptable Use Policy: Company may revise, amend, or modify this Acceptable Use Policy at any time and in any manner. Modified policy will be available on Company’s website at jolokia.com.